Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.
ea1c441d4143aa10a8cea4ef9c5ea8db4ed4e985ac12634c0cbfa3738e7f0095
----------------------------------------------------------------------
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts.
We will help with relocation and obtaining a work permit.
Currently the following type of positions are available:
http://secunia.com/quality_assurance_analyst/
http://secunia.com/web_application_security_specialist/
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
----------------------------------------------------------------------
TITLE:
Apple QuickTime Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA21893
VERIFY ADVISORY:
http://secunia.com/advisories/21893/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Apple QuickTime 7.x
http://secunia.com/product/5090/
DESCRIPTION:
Multiple vulnerabilities have been reported in Apple QuickTime, which
can be exploited by malicious people to compromise a user's system.
1) Errors in the processing of H.264 movies can be exploited to
trigger an integer overflow or buffer overflow.
2) A boundary error within the processing of QuickTime movies can be
exploited to cause a buffer overflow.
3) A boundary error within the processing of FLC movies can be
exploited to cause a heap-based buffer overflow via a FLC movie with
a specially crafted COLOR_64 chunk.
4) Errors within the processing of FlashPix files can be exploited to
cause an integer overflow or buffer overflow.
5) An error within the processing of FlashPix files can be exploited
to trigger an exception leaving an uninitialised object.
6) A boundary error within the processing of SGI images can be
exploited to cause a buffer overflow.
Successful exploitation of the vulnerabilities may allow execution of
arbitrary code.
SOLUTION:
Update to version 7.1.3.
http://www.apple.com/quicktime/download/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Sowhat of Nevis Labs, Mike Price of McAfee AVERT Labs, and Piotr
Bania.
2) Mike Price of McAfee AVERT Labs.
3) Mike Price of McAfee AVERT Labs and Ruben Santamarta.
4) Mike Price of McAfee AVERT Labs.
5) Mike Price of McAfee AVERT Labs.
6) Mike Price of McAfee AVERT Labs
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=304357
iDEFENSE:
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413
Reverse Mode:
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=25
Piotr Bania:
http://pb.specialised.info/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------